The notes -
Show youtube clip of ‘Warriors of the net’.
(13 mins long)
Learners to write in their own words the journey of a file through the internet, explaining the protocols and devices in the process.
Tcp packet
Icmp ping packet
Udp packet
The router
Ping of death
The router switch
People and machinery working together
A new era that brings people together – the dawn of the net
How does it work?
Flow of info – down into network – IP – limited in size
Divide info ^
Label with info
- Sender address
- Receiver address
Address for proxy server – launched onto LAN – connects all devices to exchange info
uncontrolled area
LAN highway – different information – goes against traffic
Router – systematic and not always up to speed but is exact for the most part
Packets leave router – corporate intranet towards router switch
Switch moves ip packets
Packets arrive, network interface takes them
Goes to proxy
Proxy is a middle man to lessen load + security
Packets are different sizes
Proxy opens the packet and looks for the url
Acceptable? Sent onto internet
Some addresses don’t need checking via the proxy and are denied
On the road again – the firewall serves to prevent nasty stuff and protects sensitive information from being sent out
Now the packet goes onto bandwidth from the router, the packets that don’t make it get replaced.
Packet of data planning
Now in the internet
Routers and switches establish links between networks
Space and places to go – little control and regulation
Dangers on the internet
- Ping of death
Packets come from different places but eventually all get there.
Another firewall – bastion of security or enemy + determines intentions
Only lets packets in that match its criteria
All over ports are closed for business
Port 25 is used for mail packets
Port 80 is used for internet packets
Firewalls block ping of death packets that disguise as normal packets
The journey almost over
Packets then get taken to the webserver
Webservers can be mainframes or even a webcam
Packets are received, opened and unpacked 1 by 1
Webserver application after unpacked
Packet then recycled
Filled with your requested info again
Addressed and sent back to you, back along everything again including internet and then back to your interface.
This supplies your web browser with the information you requested.
No comments:
Post a Comment